Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 10 additions & 0 deletions .github/workflows/postsubmit.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
name: Hydrate Go Proxy

on:
push:
branches:
- main

jobs:
call-hydrate-go-proxy:
uses: aws-controllers-k8s/.github/.github/workflows/reusable-postsubmit.yaml@main

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 5 days ago

The best way to fix the problem is to set an explicit permissions block at the workflow or job level. Since the workflow only defines a single job that calls a reusable workflow, setting permissions at the workflow root is sufficient and ensures all jobs inherit these permissions (unless overridden). The recommended minimal starting point is permissions: {} at the top level, which denies all by default; you can then increase permissions as needed. However, the appropriate permissions depend on the requirements of the reusable workflow being called. If unsure, start with permissions: read-all (which is less privileged than the old default), or preferably, an empty map ({}) for no permissions.

For this fix, add the following to the workflow after name: Hydrate Go Proxy and before on::

permissions: {}

No imports, methods, or additional definitions are required; this is a YAML workflow modification only.


Suggested changeset 1
.github/workflows/postsubmit.yaml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/postsubmit.yaml b/.github/workflows/postsubmit.yaml
--- a/.github/workflows/postsubmit.yaml
+++ b/.github/workflows/postsubmit.yaml
@@ -1,4 +1,5 @@
 name: Hydrate Go Proxy
+permissions: {}
 
 on:
   push:
EOF
@@ -1,4 +1,5 @@
name: Hydrate Go Proxy
permissions: {}

on:
push:
Copilot is powered by AI and may make mistakes. Always verify output.
1,955 changes: 1,153 additions & 802 deletions ATTRIBUTION.md

Large diffs are not rendered by default.

6 changes: 3 additions & 3 deletions apis/v1alpha1/ack-generate-metadata.yaml
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
ack_generate_info:
build_date: "2025-11-12T22:59:04Z"
build_hash: c833f2d14f4fe8953663ff92f4661ae5fb01b8c8
build_date: "2025-11-29T03:27:53Z"
build_hash: 23c7074fa310ad1ccb38946775397c203b49f024
go_version: go1.25.4
version: v0.53.1
version: v0.56.0
api_directory_checksum: adbf80ce2da1a7bb9f95b1cfe14ad3ab4566e2db
api_version: v1alpha1
aws_sdk_go_version: v1.32.6
Expand Down
2 changes: 1 addition & 1 deletion config/controller/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,4 +6,4 @@ kind: Kustomization
images:
- name: controller
newName: public.ecr.aws/aws-controllers-k8s/networkfirewall-controller
newTag: 1.1.2
newTag: 1.2.0
2 changes: 1 addition & 1 deletion go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ go 1.24.0
toolchain go1.24.1

require (
github.com/aws-controllers-k8s/runtime v0.53.1
github.com/aws-controllers-k8s/runtime v0.56.0
github.com/aws/aws-sdk-go v1.49.0
github.com/aws/aws-sdk-go-v2 v1.34.0
github.com/aws/aws-sdk-go-v2/service/networkfirewall v1.44.11
Expand Down
4 changes: 2 additions & 2 deletions go.sum
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
github.com/aws-controllers-k8s/runtime v0.53.1 h1:l9MkR1KfZW8H8icT5rrRK3pdnVVA4io/eINVe5aspWs=
github.com/aws-controllers-k8s/runtime v0.53.1/go.mod h1:OkUJN+Ds799JLYZsMJrO2vDJ4snxUeHK2MgrQHbU+Qc=
github.com/aws-controllers-k8s/runtime v0.56.0 h1:xT03K82QkY7EpdUDhVKvDY7hLddA+XnKY0xDAePALhM=
github.com/aws-controllers-k8s/runtime v0.56.0/go.mod h1:OkUJN+Ds799JLYZsMJrO2vDJ4snxUeHK2MgrQHbU+Qc=
github.com/aws/aws-sdk-go v1.49.0 h1:g9BkW1fo9GqKfwg2+zCD+TW/D36Ux+vtfJ8guF4AYmY=
github.com/aws/aws-sdk-go v1.49.0/go.mod h1:LF8svs817+Nz+DmiMQKTO3ubZ/6IaTpq3TjupRn3Eqk=
github.com/aws/aws-sdk-go-v2 v1.34.0 h1:9iyL+cjifckRGEVpRKZP3eIxVlL06Qk1Tk13vreaVQU=
Expand Down
4 changes: 2 additions & 2 deletions helm/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
apiVersion: v1
name: networkfirewall-chart
description: A Helm chart for the ACK service controller for Network Firewall (NetworkFirewall)
version: 1.1.2
appVersion: 1.1.2
version: 1.2.0
appVersion: 1.2.0
home: https://github.com/aws-controllers-k8s/networkfirewall-controller
icon: https://raw.githubusercontent.com/aws/eks-charts/master/docs/logo/aws.png
sources:
Expand Down
2 changes: 1 addition & 1 deletion helm/templates/NOTES.txt
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{{ .Chart.Name }} has been installed.
This chart deploys "public.ecr.aws/aws-controllers-k8s/networkfirewall-controller:1.1.2".
This chart deploys "public.ecr.aws/aws-controllers-k8s/networkfirewall-controller:1.2.0".

Check its status by running:
kubectl --namespace {{ .Release.Namespace }} get pods -l "app.kubernetes.io/instance={{ .Release.Name }}"
Expand Down
5 changes: 4 additions & 1 deletion helm/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@

image:
repository: public.ecr.aws/aws-controllers-k8s/networkfirewall-controller
tag: 1.1.2
tag: 1.2.0
pullPolicy: IfNotPresent
pullSecrets: []

Expand Down Expand Up @@ -120,8 +120,11 @@ watchSelectors: ""
resourceTags:
# Configures the ACK service controller to always set key/value pairs tags on
# resources that it manages.
# Note: Tags with empty values are automatically skipped to keep resources clean.
- services.k8s.aws/controller-version=%CONTROLLER_SERVICE%-%CONTROLLER_VERSION%
- services.k8s.aws/namespace=%K8S_NAMESPACE%
- app.kubernetes.io/managed-by=%MANAGED_BY%
- kro.run/kro-version=%KRO_VERSION%

# Set to "retain" to keep all AWS resources intact even after the K8s resources
# have been deleted. By default, the ACK controller will delete the AWS resource
Expand Down
29 changes: 21 additions & 8 deletions pkg/resource/firewall/manager.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

12 changes: 6 additions & 6 deletions pkg/resource/firewall/tags.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

29 changes: 21 additions & 8 deletions pkg/resource/firewall_policy/manager.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

12 changes: 6 additions & 6 deletions pkg/resource/firewall_policy/tags.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

29 changes: 21 additions & 8 deletions pkg/resource/rule_group/manager.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

12 changes: 6 additions & 6 deletions pkg/resource/rule_group/tags.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading